Credential AccessMOTA3008
The adversary is trying to steal account names and passwords
Phase: Impact
3 Techniques
6 Sub-techniques
Access Subscriber Data
MOT3004
The adversary can collect several types of user-specific data. Such data include, for instance, subscriber identities, subscribed services, subscriber location or status.
2G
3G
4G
Public
2 sub-techniques
Exploitation for Credential Access
MOT1212
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
5G-SA
Public
2 sub-techniques
SIM Card Attacks
MOT3030
Adversaries may attack SIM cards to access authentication keys and other credentials.
2G
3G
4G
5G-SA
Public
2 sub-techniques